Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/01/2025, 13:58

250131-raba1sxmhw 10

31/01/2025, 13:56

250131-q8rvzszjgm 10

Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2025, 13:56

General

  • Target

    NetSupportInstall.bat

  • Size

    66B

  • MD5

    c64fd547b11cc65bfbb93bdbfa750eef

  • SHA1

    216ce7fa10a536b32b868746da7b970382c61453

  • SHA256

    7994b920cb245256765becf9fe5bd8e09b3525814846eed4296204b454303a15

  • SHA512

    60afdc2621be2491eaa4ddda0c1f7aa689c18a022646292afed94d92a8344622bc05c36738724dbedcc1c5310ad57890e1ab9142b06c5f9127e5bedb987a2179

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Drops file in Drivers directory 6 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 64 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\NetSupportInstall.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\NetSupport School 15.10.0003.exe
      "NetSupport School 15.10.0003" /S /v/qn
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        "C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\NetSupport School.msi" /qn SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="NetSupport School 15.10.0003.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Loads dropped DLL
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 85B431DC22CF5E81DFBAC120A333DB96
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2220
    • C:\Windows\system32\cmd.exe
      cmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Views/modifies file attributes
        PID:2416
    • C:\Windows\system32\cmd.exe
      cmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Views/modifies file attributes
        PID:2584
    • C:\Windows\Installer\MSI461E.tmp
      "C:\Windows\Installer\MSI461E.tmp" /p "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\Detect64LSP.txt"
      2⤵
      • Executes dropped EXE
      PID:2160
    • C:\Windows\Installer\MSI464E.tmp
      "C:\Windows\Installer\MSI464E.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1988
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D35EA5ADDE2717247476BB7B18B6C00E M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1052
    • C:\Windows\Installer\MSI4B94.tmp
      "C:\Windows\Installer\MSI4B94.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2904
    • C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe
      "C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2612
    • C:\Windows\Installer\MSI549C.tmp
      "C:\Windows\Installer\MSI549C.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EC /Q /Q /C
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2652
    • C:\Windows\Installer\MSI54FB.tmp
      "C:\Windows\Installer\MSI54FB.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EV"NetSupport School" /EC /Q /Q /I *
      2⤵
      • Sets service image path in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2940
      • C:\Program Files (x86)\NetSupport\NetSupport School\winst64.exe
        winst64.exe /q /q /i
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:2160
    • C:\Windows\system32\cmd.exe
      cmd.exe /c secedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet
      2⤵
        PID:912
        • C:\Windows\SysWOW64\SecEdit.exe
          secedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet
          3⤵
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1852
      • C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe
        "C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe" /Q "C:\Program Files (x86)\NetSupport\NetSupport School\Client32.ini"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:2428
        • C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe"
          3⤵
          • Executes dropped EXE
          PID:1512
      • C:\Windows\Installer\MSI67B4.tmp
        "C:\Windows\Installer\MSI67B4.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EI
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2716
      • C:\Windows\Installer\MSI6C29.tmp
        "C:\Windows\Installer\MSI6C29.tmp" /i "C:\Program Files (x86)\Common Files\NSL\nslsp64.dll"
        2⤵
        • Executes dropped EXE
        PID:2496
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{46de26ef-a718-50a4-271e-ea3e54f2f320}\gdihook5.inf" "9" "6d3d268df" "00000000000002C0" "WinSta0\Default" "00000000000004A4" "208" "c:\program files (x86)\netsupport\netsupport school"
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1252
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem2.inf" "gdihook5.inf:gdihook5.Mfg.NTamd64:gdihook5:11.11.0.704:pci_gdihook5_hwid" "6d3d268df" "00000000000002C0" "00000000000005E0" "00000000000005D8"
      1⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2360
    • C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe
      "C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" /* *
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2500
      • C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe
        "C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" * /VistaUI
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1996
        • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe" /USER=SYSTEM
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2848
        • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe" /USER=SYSTEM
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Suspicious use of SetWindowsHookEx
          PID:2904
        • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2592
        • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe"
          3⤵
          • Executes dropped EXE
          PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f773518.rbs

      Filesize

      50KB

      MD5

      bcb40e074206f5a199ee18ff53b8124b

      SHA1

      be3c14a8f69425f9b6b243ba9a4f9cb83508064e

      SHA256

      921a48ed8921aaacb59d9d81ffac6734d5ba61ebb4e4a0d397f63a3856561f1d

      SHA512

      76848bf141f2a1f0c4fbd71733ce597e042fba22357a444555f73c356897372c62047bb91cd1059101fa9ceefef07ef31f3e985dda17cecb5a6e73f0259716e3

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetSupport School\NetSupport School Student Configurator.lnk

      Filesize

      2KB

      MD5

      c4faab894c751af237acf28dca007530

      SHA1

      7ba3d7e3dbfbb2e39f2221d459324f644f57c67f

      SHA256

      3632f7f44b63c9b5eddfa972af8cfb0b66a963ff9a8d61129ffaeb73908c76bc

      SHA512

      f93f34c22c53becf038264b6b2974264a230fbfe4ec20e541056d15402f9bca77cae9611c51739ab7d78d3fde45005a96d0d3911bc64fb3738db6c07c32a8850

    • C:\Users\Admin\AppData\Local\Temp\Cab3851.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\DLL_{F021B863-9473-4467-93B2-6FC48C30E42F}.ini

      Filesize

      4KB

      MD5

      f5852af49823a9f89924f0d2ebfd23b0

      SHA1

      163d69b57a7217e848e7c768411a8f4a10314603

      SHA256

      aab2cb96d012b7bd981c73aea1ca34bc747a0ec7666456668f048f90fbf24550

      SHA512

      7f9149157cbc568cfbf55453d0873bc1f68fae187e11e55eb05b5579691b6a6b5e48ce46051ab9601f059a8f2fc663bb2a6231863b7efdcd93e652468442682d

    • C:\Users\Admin\AppData\Local\Temp\Tar3873.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\_is6BC0.tmp

      Filesize

      397KB

      MD5

      1398b1605fa45565356bf3101f1171b6

      SHA1

      e5b65dcdea8cbb57595cece96646632f31b9a537

      SHA256

      3d42df344265d5c7463e158ed1aa2b42689ef17a804dff8c887e2f855d1a48ce

      SHA512

      7c90f5eb358f64a502d5b10b6b1998280b14d12634ad50483b0e2ade0dbdd33deee0376a35815782260ee1b35af99d0c56462fe9561e84652609eefa97882a7e

    • C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\0x0409.ini

      Filesize

      21KB

      MD5

      a108f0030a2cda00405281014f897241

      SHA1

      d112325fa45664272b08ef5e8ff8c85382ebb991

      SHA256

      8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

      SHA512

      d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

    • C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\Setup.INI

      Filesize

      5KB

      MD5

      6fbf86629f47eca07aaed1a95fc56777

      SHA1

      55fe7be7e600b74d5b67a66ce0d7c379c41bf550

      SHA256

      32687c846ddb54be27dd5a4f2674ef4ce08b1d3cf8621301e36b319df28ecb26

      SHA512

      89832543df122de7b0cb2cca77624e1f993b499f6d8bd514a2e86fae72867ae3e26f2c130cc216c9929d65ab7f55f93feafc549053f29157fcfd8061baf8cb84

    • C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\_ISMSIDEL.INI

      Filesize

      668B

      MD5

      0e04456a12f6ae6a7fd24dc070c6f33a

      SHA1

      ef177d64b02af1f9edb6c3dd921741494ad563ce

      SHA256

      41f458ad1e8c40755003d19e34bed49c2ae8752a9c332e5e6939a503726e0e4c

      SHA512

      b4ce31250f2530406b8c556188f6ca718f08acf62aa4cdfc0597fc2b84889c1e89f85fca4751df89edcbd75d99614f7cb79f01a4a7d7de7c7a6490f11470a321

    • C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\_ISMSIDEL.INI

      Filesize

      444B

      MD5

      2f47b757cee157f49cc016c3466b4d70

      SHA1

      f105ba94f7f02f8d2be9415de2d16bc816f42885

      SHA256

      b711254e64091abbed9b8102bd119405d1264f35cfde0e3e9fb0c448a21588b9

      SHA512

      8f5b9a43cfbb9705995394682431da5c167b6464c0dfa50f731564bb0de890e7a5be7a4aa0207b19fc790c31dac6289c13fb5d23099fdc75f7071d91c9b43b5b

    • C:\Users\Admin\AppData\Local\Temp\{6A1875C5-8753-4372-A8BF-C58D98E5AC91}\_ISMSIDEL.INI

      Filesize

      20B

      MD5

      db9af7503f195df96593ac42d5519075

      SHA1

      1b487531bad10f77750b8a50aca48593379e5f56

      SHA256

      0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

      SHA512

      6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

    • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\Client32.upd

      Filesize

      25B

      MD5

      c05c19b006d57dd4c90785cbe5c7877b

      SHA1

      34beebb832e53e4a3b9b3349919689fdf1401151

      SHA256

      00e0c629d5645c15df66adcf99e8a0a3e517d7a7876141ae7a752f0585eec047

      SHA512

      bede1e24476a12e9b1f29962254b19b357bfdfbe5c6eec9a2fca6c1b2105f4cec1d5872f6be269ef39d6e5cc542dc587ea9555ef87687bac64b3ff0de16c0f8c

    • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NSM.LIC

      Filesize

      282B

      MD5

      39030ae352cc16a7fd0bf49261d97403

      SHA1

      485f2944ead7b484a052c2f436ed950327bfc961

      SHA256

      52703269ec26d1988de1efda21597a3faf563e980e1afc5434441ecd34d80ded

      SHA512

      7c89c1263b693e0802379bfbbd785d354b0686f354abb2aa9f982b3c53dda316d7c584a3af0d4b3fc1a072c49986fa4b93a99b63d9dc2645f798ff8913a29a3d

    • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\product.dat

      Filesize

      506B

      MD5

      ff7c0d2dbb9195083bbabaff482d5ed6

      SHA1

      5c2efbf855c376ce1b93e681c54a367a407495dc

      SHA256

      065d817596d710d5a06060241acc207b82b844530cc56ff842ff53d8ff92a075

      SHA512

      ea226b3a55fc59175136f104df497ebf5055624fb1c1c8073b249dfc5e1ed5818a6feee995aa82cf9ed050f1adc7a62994c90b1af03569dfe0d4551ee2bc70c9

    • C:\Windows\Installer\MSI3C4F.tmp

      Filesize

      511KB

      MD5

      d524b639a3a088155981b9b4efa55631

      SHA1

      39d8eea673c02c1522b110829b93d61310555b98

      SHA256

      03d91c8cd20b846625a092a3dae6a12369930c65d6216a455a00449ebb0dc289

      SHA512

      84f8ab54122f93a40da08fd83bca767ab49eb0f73c4ab274d9bda11dd09224134df011fa02e5a3abbafcc6fbef6a60673dd48feabdf829a1e22c85a2a759b7ac

    • C:\Windows\Installer\MSI3C7E.tmp

      Filesize

      487KB

      MD5

      d21afcbb8d2e5a043841b4d145af1df6

      SHA1

      849db8ddad9e942bfe20a50666d17484b56a26e3

      SHA256

      c9d4fd904650e4e53de4018951906c1434420d65cdb33e48c23b6c22bc9fdd4c

      SHA512

      ecb8fbb2826f7f47eed46897701d42873b17b7599cd785ca54e900b793e3de1179c4d6441f317aa5298ae52c1c11157ae43b11822aa0076b9ec93ad5e46f0225

    • C:\Windows\Installer\MSI3E09.tmp

      Filesize

      153KB

      MD5

      a1b7850763af9593b66ee459a081bddf

      SHA1

      6e45955fae2b2494902a1b55a3873e542f0f5ce4

      SHA256

      41b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af

      SHA512

      a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1

    • C:\Windows\Installer\MSI4B94.tmp

      Filesize

      745KB

      MD5

      0228cb02aa58ef2876713130990c8ccf

      SHA1

      f6766273a186b6911a6127fbb5af90125e267bbe

      SHA256

      3651a2131f423c5c553476236be7ad4f26a63c67d872c3b9ecc135d1d184b1ed

      SHA512

      a07664e639252a2bd34f42fb6907b95889d31657aa81fcdeea4b171bf3410bd3d56f5e404ee8fc16938d826f7cfffc46efcfe74126afec6e87cb048618d26e89

    • C:\Windows\Installer\MSI546C.tmp

      Filesize

      244KB

      MD5

      c4ca339bc85aae8999e4b101556239dd

      SHA1

      d090fc385e0002e35db276960a360c67c4fc85cd

      SHA256

      4ab23609cdc64d10b97c9ccb285ed7100f55d54d983cd50762da25ecac4357f9

      SHA512

      9185ec32545fc838d7fef6c9e4dd222dd02114c661b0b344f16287d55e6571bfe7a4233a852acc579d07bcdbab18c5c034c465b1f4bb78535ed51c3499087fe0

    • C:\Windows\System32\DriverStore\Temp\{22f762fb-26f6-61ba-3ac0-b0595ac1a117}\SET5E0A.tmp

      Filesize

      8KB

      MD5

      2d31ce5fe7cd81c996615ebcc29c058a

      SHA1

      4d74fe8e3170d36666df779e43fe8016986b154a

      SHA256

      019290c9b7e5b48fb6de95f9563ed481cd42f8658451c6fbc8ad131d61209ce0

      SHA512

      b8188481050630e7317d2f0687790a46e86f30a79f34164e4b02ec28da39334da80bd494a4f32ae8bb60fa2f01273cdcd9d15100f901517b0c01507678330052

    • C:\Windows\System32\DriverStore\Temp\{22f762fb-26f6-61ba-3ac0-b0595ac1a117}\SET5E0B.tmp

      Filesize

      2KB

      MD5

      703c7774b981e5d02e058340a27a5b75

      SHA1

      37534d7f0b31d2328d70ca578047d597273b73b6

      SHA256

      4cfca868959f4e1b85bfd6b8a970ae06c0810d9c341f260df3ab8479089500e9

      SHA512

      758e84915fa7ebb343bafd096bc40d9d226fe0da7c167b2b8e59f664e1be796143228bc3405df7e3447cdc918004db516344365d3d07a8e6c040df2b90456d78

    • C:\Windows\System32\DriverStore\Temp\{22f762fb-26f6-61ba-3ac0-b0595ac1a117}\x64\SET5DE9.tmp

      Filesize

      95KB

      MD5

      52b88eb20beb3b34a692a4cae0ff2196

      SHA1

      26a297b2baeb118f8856c1de41ee855572ba958a

      SHA256

      2b675e9c27d3fb01cb9df2583b380de8dc8c0d5bbbe18af458f90b47c6d62b03

      SHA512

      29567fc4db46d85f9ab8f6ecf2a708ec2c8def2e49eccd439daceda327b7411957b2014171a8370c3928d4a03a13bc6124d93678a87684370a5e6042d1c2ad6e

    • C:\Windows\System32\DriverStore\Temp\{22f762fb-26f6-61ba-3ac0-b0595ac1a117}\x64\SET5DF9.tmp

      Filesize

      68KB

      MD5

      9a348ed02f8b1efc9bfc5f53827f8a9c

      SHA1

      c1f22705392af57b277d1fb4f46258dddffe8f33

      SHA256

      641f2b86f013a95707ffdf0f584e3a83fedc1392cea3b546905b9ccb54ae10cf

      SHA512

      9debb460fd74cb586ed66b7fa4bbb51a8e1184c1a061e81f4fd6f5e700fdb1e91b809a3f517fe55dd889f60df6ea29190455073dfa1cb5b85032b91efd12033f

    • C:\Windows\System32\drivers\pcisys.sys

      Filesize

      22KB

      MD5

      84dee0f25fe97868071202065dab63bb

      SHA1

      64a6c2e0d4561a726bdce5491d12693a96c45839

      SHA256

      de5ace5c2a02afb01a90ba39b305a8f3c783883012432d22912910ead44ad60a

      SHA512

      200a162cad66b4eaf94b02f31fa6986028b42ea4497d234131ce3f6b8154146c00881fc75f63b077b0ccdd47a62340440884eff2199f00d4f035622903fb8d1f

    • C:\Windows\inf\oem2.PNF

      Filesize

      8KB

      MD5

      fb0bf8856762d27bb0e483b49451c78c

      SHA1

      fe95d2837c4fba60a899c4d0a19a6a645d946444

      SHA256

      ca95d830e08e4512bf2bd634940a51a17ef560338d3fdd1597d5f89fef112e50

      SHA512

      bdd75c38659a55ae790cd23b3897640ec64163d89ba018045b63364122188db8ea58ae31ad1144195f28c8e2ffab87f64daf7c4c9ecad5cd6602dad89dea15a0

    • \Windows\Installer\MSI3BC1.tmp

      Filesize

      169KB

      MD5

      0e6fda2b8425c9513c774cf29a1bc72d

      SHA1

      a79ffa24cb5956398ded44da24793a2067b85dd0

      SHA256

      e946b2fae0b36c43064463a8c16a2774adac30c4188c5af90e9338b903c501c9

      SHA512

      285bb7759a1214abed36162ac8be2d48df17a05278c4de97562448e20fd43b635563a6819f37e23d92a5f5ed0205a68bffe43dac0d3a67513bd0303b4e7f89aa

    • memory/1996-720-0x0000000000330000-0x000000000034B000-memory.dmp

      Filesize

      108KB

    • memory/1996-721-0x0000000000330000-0x000000000034B000-memory.dmp

      Filesize

      108KB

    • memory/1996-741-0x0000000004E30000-0x0000000004F37000-memory.dmp

      Filesize

      1.0MB

    • memory/1996-751-0x0000000000330000-0x000000000034B000-memory.dmp

      Filesize

      108KB

    • memory/1996-752-0x0000000000330000-0x000000000034B000-memory.dmp

      Filesize

      108KB

    • memory/2428-683-0x0000000002420000-0x00000000025A0000-memory.dmp

      Filesize

      1.5MB

    • memory/2800-445-0x00000000003D0000-0x00000000003D9000-memory.dmp

      Filesize

      36KB

    • memory/2848-749-0x0000000002410000-0x0000000002450000-memory.dmp

      Filesize

      256KB